Analysis

  • max time kernel
    154s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 00:49

General

  • Target

    8b11e2aa748a26f8e41a484e66d6438645a81183722833c3f079e6ad4a5edcdc.exe

  • Size

    24KB

  • MD5

    9a70f898baa94812d9810595c09c413b

  • SHA1

    11b8602b99b7ba71d834c9a16aef5209836cf718

  • SHA256

    8b11e2aa748a26f8e41a484e66d6438645a81183722833c3f079e6ad4a5edcdc

  • SHA512

    a2f3a231b2c4e66855abe8a5c58050c2f3fbf6b8dbbf01bdbdb17008e8d0ee73268b8510a2feb484ce47637ae25a60812d4a748c6952484623abaee1af7ecaf7

  • SSDEEP

    768:GvEwVMWLfB0DXrUk1T6y/vLEtMhv+bMauUrdEMzV:mVxLfw1TGyv+XbpEQ

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b11e2aa748a26f8e41a484e66d6438645a81183722833c3f079e6ad4a5edcdc.exe
    "C:\Users\Admin\AppData\Local\Temp\8b11e2aa748a26f8e41a484e66d6438645a81183722833c3f079e6ad4a5edcdc.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3328
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\System32"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\System32"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:4304
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\System32" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4504
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4516
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\System32"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\System32"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1740
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\System32" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:5052
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 2.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4148
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c takeown /f "C:\Windows\System32"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4564
        • C:\Windows\SysWOW64\takeown.exe
          takeown /f "C:\Windows\System32"
          4⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3124
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Windows\System32" /grant administrators:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:920
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /im "cstrike-online.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3236
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 1.bat
      2⤵
        PID:3400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1.bat

      Filesize

      253B

      MD5

      9df09e9265cd1e4cc651f52b9aa4c1c1

      SHA1

      9a609c00facd857bb159325ca8b100939bdd2073

      SHA256

      7016477d097a69d90ddf1c581c54290e7514b00f2883f51107cebf2937f3d93f

      SHA512

      12bded1d9cf3fd654223b53cc064ab3124e810e0b1850c85d4d87f98cef9f26a1623cb9bce8516f2cd3216f9aed7e38d30797a76c869850bb795668162c38911

    • C:\Users\Admin\AppData\Local\Temp\2.bat

      Filesize

      110B

      MD5

      12e768a105dc0d143a5f5becdd12167a

      SHA1

      8f82f11fc9b8921b1a80eb23b600d243a8756766

      SHA256

      0f909a1c0e0cddb3f99f0a7bac66a86797f25635b15fb25faa0bffcc5e702056

      SHA512

      3ba416aa4d0575fe281b24b1cc7401254ad2c38de37b340a780e8796f34738d48f6a89801596bbfaed009c1fb74255cf0caf49997cf1e679ea6075b02b758c77

    • C:\Users\Admin\AppData\Local\Temp\2.bat

      Filesize

      110B

      MD5

      12e768a105dc0d143a5f5becdd12167a

      SHA1

      8f82f11fc9b8921b1a80eb23b600d243a8756766

      SHA256

      0f909a1c0e0cddb3f99f0a7bac66a86797f25635b15fb25faa0bffcc5e702056

      SHA512

      3ba416aa4d0575fe281b24b1cc7401254ad2c38de37b340a780e8796f34738d48f6a89801596bbfaed009c1fb74255cf0caf49997cf1e679ea6075b02b758c77

    • C:\Users\Admin\AppData\Local\Temp\2.bat

      Filesize

      110B

      MD5

      12e768a105dc0d143a5f5becdd12167a

      SHA1

      8f82f11fc9b8921b1a80eb23b600d243a8756766

      SHA256

      0f909a1c0e0cddb3f99f0a7bac66a86797f25635b15fb25faa0bffcc5e702056

      SHA512

      3ba416aa4d0575fe281b24b1cc7401254ad2c38de37b340a780e8796f34738d48f6a89801596bbfaed009c1fb74255cf0caf49997cf1e679ea6075b02b758c77

    • C:\Windows\SysWOW64\dllcache\iphlpapi.dll

      Filesize

      192KB

      MD5

      c5aeb7380529d5a609517e724bcf54fc

      SHA1

      f0af09b6abb466bfa80e60fa705af5e665e2a4a3

      SHA256

      7069b1d3c2a83a731e07e8a9bc068c0460dece876e46c883da86660da4c7ebd1

      SHA512

      ba1f2af12e6ce7d5a5db00f48193b1888d2352e7459a38f0cf310d5df82806b58c9e72d9208ab9e3fe66a161e09a614b01cbbb823d1a1046f5dd6ae234b0cbcc

    • C:\Windows\SysWOW64\dllcache\rasadhlp.dll

      Filesize

      12KB

      MD5

      e8e5bb24636ba0fb68e42defc8fd5a85

      SHA1

      7a6042c4b5c43f2066adde46f43e63e5a697729e

      SHA256

      c69d6190423cf0f2b81acf2745200b7009a5d6ef0f1845351cedf72587794517

      SHA512

      2dc4b0ecd185c4432fec463d916b9513280ebcf295dba84338d6677611c854d2e5c244885c969c85864f7e3d7eb801e10a8f34202fb7eb768671fa49bf756471

    • C:\Windows\SysWOW64\iphlpapi.dll

      Filesize

      192KB

      MD5

      c5aeb7380529d5a609517e724bcf54fc

      SHA1

      f0af09b6abb466bfa80e60fa705af5e665e2a4a3

      SHA256

      7069b1d3c2a83a731e07e8a9bc068c0460dece876e46c883da86660da4c7ebd1

      SHA512

      ba1f2af12e6ce7d5a5db00f48193b1888d2352e7459a38f0cf310d5df82806b58c9e72d9208ab9e3fe66a161e09a614b01cbbb823d1a1046f5dd6ae234b0cbcc

    • C:\Windows\SysWOW64\rasadhlp.dll

      Filesize

      12KB

      MD5

      e8e5bb24636ba0fb68e42defc8fd5a85

      SHA1

      7a6042c4b5c43f2066adde46f43e63e5a697729e

      SHA256

      c69d6190423cf0f2b81acf2745200b7009a5d6ef0f1845351cedf72587794517

      SHA512

      2dc4b0ecd185c4432fec463d916b9513280ebcf295dba84338d6677611c854d2e5c244885c969c85864f7e3d7eb801e10a8f34202fb7eb768671fa49bf756471

    • memory/920-148-0x0000000000000000-mapping.dmp

    • memory/1740-140-0x0000000000000000-mapping.dmp

    • memory/1836-132-0x0000000000000000-mapping.dmp

    • memory/3124-147-0x0000000000000000-mapping.dmp

    • memory/3236-151-0x0000000000000000-mapping.dmp

    • memory/3312-139-0x0000000000000000-mapping.dmp

    • memory/3400-152-0x0000000000000000-mapping.dmp

    • memory/4028-134-0x0000000000000000-mapping.dmp

    • memory/4148-144-0x0000000000000000-mapping.dmp

    • memory/4304-135-0x0000000000000000-mapping.dmp

    • memory/4504-136-0x0000000000000000-mapping.dmp

    • memory/4516-137-0x0000000000000000-mapping.dmp

    • memory/4564-146-0x0000000000000000-mapping.dmp

    • memory/5052-141-0x0000000000000000-mapping.dmp